Vulnerability Description
The auto-update feature of Open Embedded Linux Entertainment Center (OpenELEC) 6.0.3, 7.0.1, and 8.0.4 uses neither encrypted connections nor signed updates. A man-in-the-middle attacker could manipulate the update packages to gain root access remotely.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openelec | Openelec | 6.0.3 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/96580
- https://tech.feedyourhead.at/content/openelec-cve-2017-6445-revisited
- https://tech.feedyourhead.at/content/openelec-remote-code-execution-vulnerabilitExploitTechnical DescriptionThird Party Advisory
- http://www.securityfocus.com/bid/96580
- https://tech.feedyourhead.at/content/openelec-cve-2017-6445-revisited
- https://tech.feedyourhead.at/content/openelec-remote-code-execution-vulnerabilitExploitTechnical DescriptionThird Party Advisory
FAQ
What is CVE-2017-6445?
CVE-2017-6445 is a vulnerability with a CVSS score of 8.1 (HIGH). The auto-update feature of Open Embedded Linux Entertainment Center (OpenELEC) 6.0.3, 7.0.1, and 8.0.4 uses neither encrypted connections nor signed updates. A man-in-the-middle attacker could manipul...
How severe is CVE-2017-6445?
CVE-2017-6445 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-6445?
Check the references section above for vendor advisories and patch information. Affected products include: Openelec Openelec.